Security Architect; Data
Listed on 2026-03-01
-
IT/Tech
Cybersecurity, Systems Engineer -
Engineering
Cybersecurity, Systems Engineer
Location: City of Rochester
Come join our team! At Unlimited Technology, we are committed to our company's core values of Passion, Collaboration, Innovation and Adaptability. With offices throughout the United States, we are a premier cyber and physical security specialty contractor, and we are growing at a rapid pace. We have a wide range of talented and experienced individuals that deliver cutting edge technology solutions to meet our customers’ ever-changing needs.
We secure the facilities and networks of the world’s leading brands and critical infrastructure and are recognized leaders in the physical and IT security, cyber, and managed services industries. UT offers a rewarding career, great benefits, and the chance to learn and work with ground-breaking technology and premier clients.
The Chief Security Architect (Data) onsite 5 days a week in Rochester, NY is the senior technical authority responsible for defining and governing the cybersecurity architecture for energy utility data, network, and grid‑adjacent environments, including Advanced Metering Infrastructure (AMI), Distributed Energy Resources (DER), and private utility WANs. This role requires deep expertise in large‑scale networking (switching, routing, WAN, transport) combined with cybersecurity architecture and risk assessment, with a strong understanding of IT/OT boundaries, grid modernization, and utility operational risk.
The position plays a critical role in ensuring secure, resilient, and compliant architectures that support grid reliability, customer data protection, and regulatory expectations.
- Define and maintain the enterprise security architecture for:
- Utility data centers
- Private utility WANs
- AMI head‑end and meter data management systems (MDMS)
- DER and grid‑edge integration platforms
- Establish architectural standards that enforce:
- IT/OT separation
- Secure utility demarcation points
- Controlled ingress/egress between enterprise, AMI, and operational zones
- Lead security architecture reviews for:
- AMI networks (RF mesh, cellular, fiber‑backed aggregation)
- AMI head‑end systems and MDMS platforms
- DER integrations (solar, storage, EV charging, microgrids)
- Ensure secure integration of:
- Third‑party DER aggregators
- Cloud‑hosted AMI and analytics platforms
- Define security controls to mitigate:
- Lateral movement from AMI into enterprise or OT systems
- Unauthorized DER command and control
- Supply‑chain and vendor access risks
- Provide hands‑on architectural leadership for:
- Datacenter switching and routing
- Utility private WAN and carrier connectivity
- Inter‑data‑center and regional transport networks
- Design and review architecture leveraging:
- Cisco Nexus (NX‑OS, EVPN, VXLAN, ACI)
- Nokia (SR OS, IP/MPLS, Service Routers)
- Ciena (optical transport, DCI, coherent optics)
- Embed security into:
- BGP, OSPF, IS‑IS, MPLS, EVPN
- AMI backhaul and aggregation networks
- Utility‑owned and leased transport circuits
- Conduct formal cybersecurity architecture reviews for:
- AMI expansions
- DER onboarding initiatives
- New private and cloud connectivity
- Perform:
- Threat modeling specific to utility attack scenarios
- Attack‑path and lateral movement analysis
- Control effectiveness assessments
- Identify architectural risks related to:
- Improper zone termination
- Inadequate segmentation
- Over‑trust of vendor‑managed systems
- Provide risk‑based remediation guided by operational realities.
- Define segmentation strategies aligned to utility environments:
- Enterprise IT
- AMI / Grid Edge
- OT / Control Systems
- Ensure security architectures support:
- Zero Trust principles where applicable
- Strong identity, authentication, and authorization
- Define monitoring and visibility requirements for:
- AMI traffic
- DER command‑and‑control paths
- Inter‑zone communications
- Ensure integration with:
- SIEM
- Network Detection & Response (NDR)
- Flow telemetry (Net Flow, IPFIX)
- Support compliance and audit activities related to:
- Utility cybersecurity regulations and standards
- Internal and external…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).